DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
RootMe | TryHackMe | Spanish

RootMe | TryHackMe | Spanish

1
Comments
4 min read
Why Does My SSL Site Return the Wrong Certificate When Accessed via IP?

Why Does My SSL Site Return the Wrong Certificate When Accessed via IP?

6
Comments 2
3 min read
8 important security changes from Android 8 to Android 15

8 important security changes from Android 8 to Android 15

Comments
10 min read
XSS URL Analysis and SQL Injection Workflow

XSS URL Analysis and SQL Injection Workflow

Comments
4 min read
[Hack] PicoCTF: Low Level Binary Intro - Intro to Debuggers

[Hack] PicoCTF: Low Level Binary Intro - Intro to Debuggers

Comments
9 min read
India Needs Cyber Unity: How Government and Professionals Can Collaborate to Secure Our Digital Borders

India Needs Cyber Unity: How Government and Professionals Can Collaborate to Secure Our Digital Borders

Comments
2 min read
5 Best Free Reverse Proxy Solutions for 2025

5 Best Free Reverse Proxy Solutions for 2025

5
Comments
3 min read
How to Configure IIS to Use HTTP/2

How to Configure IIS to Use HTTP/2

Comments
4 min read
CISSP: Developing Strategic Security Leadership

CISSP: Developing Strategic Security Leadership

Comments 2
2 min read
Real-time cloud security thinking bigger

Real-time cloud security thinking bigger

Comments
1 min read
Cloud Security – Protecting Innovation at Cloud Speed

Cloud Security – Protecting Innovation at Cloud Speed

Comments
1 min read
💀 MaskGod: The Final Boss of URL Masking 🕶️

💀 MaskGod: The Final Boss of URL Masking 🕶️

11
Comments 4
2 min read
(Ⅱ)【Report Review】2024 OWASP Mobile Top 10 Risks

(Ⅱ)【Report Review】2024 OWASP Mobile Top 10 Risks

Comments
1 min read
MitM Attack in Symfony: Prevention with Secure Coding

MitM Attack in Symfony: Prevention with Secure Coding

3
Comments
4 min read
🌐 Computer Networks: The Backbone of the Internet

🌐 Computer Networks: The Backbone of the Internet

1
Comments
2 min read
Understanding Networking Commands - Why They Matter

Understanding Networking Commands - Why They Matter

3
Comments
4 min read
We Tested AI Platforms for “Vibe Scamming” - Here’s What Happened

We Tested AI Platforms for “Vibe Scamming” - Here’s What Happened

Comments
1 min read
Fine-Tuning SSL Protocols and Ciphers in SafeLine WAF

Fine-Tuning SSL Protocols and Ciphers in SafeLine WAF

5
Comments
2 min read
ИИ в кибербезопасности: нейросети для аномалий и фишинга, риски и защита

ИИ в кибербезопасности: нейросети для аномалий и фишинга, риски и защита

1
Comments
2 min read
(Ⅰ)【Report Review】2024 OWASP Mobile Top 10 Risks

(Ⅰ)【Report Review】2024 OWASP Mobile Top 10 Risks

Comments
1 min read
A Lightweight Authentication and Key Negotiation Protocol for IIoT using ECC

A Lightweight Authentication and Key Negotiation Protocol for IIoT using ECC

Comments
1 min read
How I Found a CORS Misconfiguration + No Rate Limiting on a Live Website

How I Found a CORS Misconfiguration + No Rate Limiting on a Live Website

5
Comments
2 min read
Why Red Teaming Isn’t Just for Cybersecurity Anymore: The rise of AI Red Teaming

Why Red Teaming Isn’t Just for Cybersecurity Anymore: The rise of AI Red Teaming

10
Comments
4 min read
CCSP Certification: Your Ultimate Guide to the Certified Cloud Security Professional

CCSP Certification: Your Ultimate Guide to the Certified Cloud Security Professional

Comments
4 min read
Cybersecurity Metrics & KPIs in 2025: The Key Indicators Every Business Should Track

Cybersecurity Metrics & KPIs in 2025: The Key Indicators Every Business Should Track

Comments 2
3 min read
loading...